Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What to Look for in a Modern EDR Solution: 6 Critical Capabilities

The threat landscape now includes fileless attacks, zero-day exploits, and sophisticated lateral movements that evade signature based defenses. Basic antivirus or simple endpoint agents leave gaps that adversaries exploit. When today’s attackers bypass static defenses or hide in legitimate processes, security teams struggle with delayed alerts, false positives, and lengthy investigations. That fumbling window can lead to data loss, system encryption, or persistent footholds.

Speeding Up Vulnerability Remediation Through Threat Correlation in XDR

In cybersecurity, speed matters. But so does clarity. When your organization is facing hundreds or thousands of known vulnerabilities, not every one deserves immediate attention. The real challenge is knowing which ones do and acting fast. That’s where the integration of threat correlation and extended detection and response (XDR) comes in. Vulnerability remediation isn’t just about patching; it’s about remediation with context.

Securing the Next Era: Why Agentic AI Demands a New Approach to API Security

I’ve spent my career building solutions to protect the API fabric that powers modern businesses. I founded Salt because I saw that traditional security tools such as WAFs, gateways, and CDNs weren’t designed to see or secure APIs. That gap led to breaches, blind spots, and billions in risk. Today, we’re facing a new wave of risk that’s even bigger than the last. The rise of Agentic AI has brought us to a true inflection point. Agentic AI isn’t just another software layer.

What We Found with OpenAI's Codex CLI Tool

In this video, I explore OpenAI’s Codex CLI tool to see how powerful it really is for coding with AI. But things quickly go off the rails… what started as a simple test ended with a surprise identity verification request. Apparently, to continue using the tool, I need to submit a government-issued ID and a photo of myself—something I didn’t expect at all. I talk through the process, show the error I ran into, and share my honest thoughts on this level of access and how invasive it feels for a developer tool.

How Keeper Protects Non-Human Identities (NHIs) in IT Environments

As infrastructure becomes more automated and distributed, the number of Non-Human Identities (NHIs) within enterprise environments has quietly surpassed that of human users. These NHIs now play a foundational role in everything from DevOps pipelines to AI-powered workflows, often relying on secrets like API keys, certificates and tokens to access systems and perform critical tasks. While NHIs are doing more, they’re being secured less.

Fixing 4,000 Vulnerabilities? Quick Ways to Eliminate Security Issues! #podcast #infosec

Mend.io, formerly known as Whitesource, has over a decade of experience helping global organizations build world-class AppSec programs that reduce risk and accelerate development -– using tools built into the technologies that software and security teams already love. Our automated technology protects organizations from supply chain and malicious package attacks, vulnerabilities in open source and custom code, and open-source license risks.

Ransomware Detection and Response: Strengthening Your Cyber Resilience

In 2024, the average ransom payment surged to nearly $4 million, more than double the previous year, while over 70% of ransomware incidents involved data encryption (Source: The Latest Ransomware Statistics & Trends ). These figures underscore the growing scale and sophistication of ransomware threats. As attackers refine their tactics and target critical infrastructure, organizations must adopt a more strategic and proactive approach to detection and response.

110 security and compliance statistics for tech leaders to know in 2025

Staying compliant has never been more complex or more critical. With evolving regulations, expanding tech stacks, and increasing third-party exposure, today’s security and compliance teams are under constant pressure to reduce risk while upholding trust. Understanding the latest trends is key to staying ahead. ‍ This roundup of security and compliance statistics brings together the most up-to-date data on regulatory readiness, breach impact, automation, vendor risk, and more.

The Power of Scheduled Automated Backups for DevOps and SaaS

In 2020, a DevOps team at a mid-sized fintech startup almost lost its entire source code. A failed container update caused a cascading failure in their self-hosted GitLab instance. The backup was… somewhere. No one checked it in weeks. The recovery process took three days. The cost was around $70,000 in downtime and customer compensation. The event wasn’t a matter of not having a backup strategy. It was a matter of assuming someone, somewhere, had run the proper function at the right time.